Medicare and Social Security beneficiaries across the country report receiving calls from scam operators (frequently with foreign accents), who claim to represent Medicare, Social Security, or an insurance company. These callers claim that new Medicare, Social Security, or supplemental insurance benefits cards are being issued or that the beneficiary’s file must be updated. The scam artist asks the citizen to verify or provide their personal banking information, which is then used to commit theft.”

Image-I-Nation Technologies, Inc., which provides hosting services and software to consumer reporting agencies like Equifax, Experian and TransUnion, experienced a supply chain breach that left users’ personal information exposed for as long as two weeks.

“This breach disclosure highlights just how little control individuals have over the security and location of their personal data..” Read more..

How to Protect Your Android Devices from Ransomware Attacks

In order to protect against such threats on mobile devices, you are recommended to:

Always keep regular backups of your important data.

Make sure that you run an active anti-virus security suite of tools on your machine.

Avoid downloading apps from unknown sites and third-party app stores.

Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store.

Do not open any email attachments from unknown sources.

Finally, browse the Internet safely.

And let’s analyze that advice with our critical eye:

Always keep regular backups of your importantdata. Because it’s not a question of if you’ll get screwed, it’s a question of when.

Make sure that you run an active anti-virus security suite of tools on your machine. No arguements. If it connects to the Internet you NEED this. But KNOW THIS: it’s only a semi-effective shield, NOT bulletproof armor.

Always pay close attention to the permissions requested by an app, even if it is downloaded from an official app store. Utterly pointless to advise this. First of all no one will. Second, were ‘average people’ to start doing this, they’d have no clue what all that ‘tech jargon’ means. And 3rd, most apps don’t offer you any choices with ‘Permissions’ – if you want the app, you have to accept the ads and the spying. So let’s just use my #3 as our guide.

Do not open any email attachments from unknown sources. Um. People who still do this have never read a tech article in their life. So they aren’t seeing this.Those who do (read articles) KNOW email is still a favorite way for the criminals to infect your machine. MY advice? Unless someone you know has told you, “I’m sending you a document”, don’t open it – period.

Finally, browse the Internet safely. What? Great advice! Only one problem — thereisnosuchthing. ( Um … I guess that translates to “don’t look at pron”?)

Do not ‘jailbreak’ or ‘root’ your device. (Okay.. so I had to add one.)

* * *

Today’s quotable quote: “Lighten up, just enjoy life, smile more, laugh more, and don’t get so worked up about things.” ~ Kenneth Branagh

“If you think you are downloading apps from Google Play Store and you are secure, then watch out! Someone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently …” Read More..

“More than 500 mobile apps on Google Play were recently discovered containing an advertising software development kit capable of downloading malicious plug-ins that can spy on Android users’ call histories.. Apps using the ad SDK, a product called Igexin, were downloaded over 100 million times by Android device owners before Google removed these programs from its store..” Read more..

Tell your friends.

Addenda: I have been asked my thoughts on Wikileaks and the (alleged) CIA hacking tools (such as this one, posted today) often enough now that I think I should mention them here.. please don’t think the CIA are the only folks who can do/are doing these ‘exploits’. They basically copied from the hackers. These things are possible because all our devices/technologies are inherently, fundamentally, insecure. (Don’t believe me? Read this.)

* * *

Today’s quote: “I am thankful the most important key in history was invented. It’s not the key to your house, your car, your boat, your safety deposit box, your bike lock or your private community. It’s the key to order, sanity, and peace of mind. The key is ‘Delete.'” ~ Elayne Boosler

• About Tech Paul

I am a Retired computer & network technician. I used to think the machines were pretty cool. Now I don’t.
They’re anything but.

I regularly posted how-to’s and tricks & tips and general computing advice here starting in 2007. (Use the Search tool to find answers. But be aware, many are rather dated.) Sometimes I answered (your) specific questions in an article if I believed the answer was generally helpful to “everyone”. All the writing you see was my own, typos and all. There always is/was an implied “IMHO” in what you see here.

Note: You are responsible for using this blog and its content. I am in no way liable for any losses caused by user error, viruses and/or other malware, hardware or software failure, or any other conceivable reason.

Previous Tips & Answers (aka Search This Site)

A Winner’s Blueprint for Achievement

BELIEVE while others are doubting. PLAN while others are playing. STUDY while others are sleeping. DECIDE while others are delaying. PREPARE while others are daydreaming. BEGIN while others are procrastinating. WORK while others are wishing. SAVE while others are wasting. LISTEN while others are talking. SMILE while others are frowning. COMMEND while others are criticizing. PERSIST while others are quitting.